Track 3: Secure the Network

Wednesday, February 24, 2021

- EST
Cyber Security in the Age of Things – Revealing Check Point IoT Security Solution
Join Stream
Itzik Feiglevitch
Itzik Feiglevitch
Check Point, Product Manager

Growing at an exponential rate, IoT devices bring significant value and revolutionize the way businesses run their operations today. Unfortunately, IoT devices also pose significant cyber security risks. These widely deployed IoT devices are highly vulnerable, unpatched and easy to be hacked into. Even more concerning is that they create an attractive attack surface for cyber criminals. Since traditional IT security solutions were not designed for IoT security, it's time for a different approach. In this session, we will present IoT cyber security technologies and will introduce Check Point’s new IoT cyber security solution that is designed to protect the huge number of IoT devices inside any environment and to protect your network from vulnerable devices.

- EST
Keeping the Edge Sharp - Performance Management Simplified
Join Stream
Valeri Loukine
Valeri Loukine
Check Point, Cyber Security Evangelist, Community Lead

In the dynamic world of constantly changing throughput requirements and rapidly evolving cyber security threat, performance is a moving target. In this session, we discuss performance related challenges and ways to resolve them, including the latest innovations such as Dynamic Workflows and Hyperscale solutions.

- EST
Identity Based Access Control and Threat Prevention
Join Stream
Peter Elmer
Peter Elmer
Check Point, Security Expert Europe

Today’s agile working environments require access control and threat prevention performed based on users’ identity. In addition, devices used must be monitored for compliance and corporate guidelines adherence. In this breakout session you will learn how Check Point integrates to on-premises and cloud based directories. You will understand the advantages of consuming identity access tokens from SAML providers that bind authentication and authorization to the compliance state of the machine used. Participants will get enabled using solution based documentation to architect solutions for their customers.

- EST
R81: Introducing New Capabilities delivered from the Cloud and SmartConsole Web
Join Stream
Anat Eytan
Anat Eytan
Check Point, Product Manager, Products - R&D
Guy Israeli
Guy Israeli
Check Point, Product Manager, Product Management

Managing security today can be challenging. Across our networks, data centers, and multi-cloud environments that are all connected, we have more devices, more applications and more threats that leave our organizations vulnerable. The key to reducing the complexity of managing all these moving pieces is security consolidation. R81 is the industry’s most advanced threat prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise. Providing autonomous prevention, R81 aims to relieve the IT admins’ daily effort and make managing cyber security the simplest it’s ever been. Whether it is deploying the latest technologies and security to protect the organization or expertly crafting security policies, R81 enables enterprises to be their best. Join this session to see how we continue to innovate and take security management to new heights for every business with centralized management control across all networks and cloud environments, increased operational efficiency and less complex security management.

- EST
Cyber Security in the Age of Things – Revealing Check Point IoT Security Solution
Join Stream
Itzik Feiglevitch
Itzik Feiglevitch
Check Point, Product Manager

Growing at an exponential rate, IoT devices bring significant value and revolutionize the way businesses run their operations today. Unfortunately, IoT devices also pose significant cyber security risks. These widely deployed IoT devices are highly vulnerable, unpatched and easy to be hacked into. Even more concerning is that they create an attractive attack surface for cyber criminals. Since traditional IT security solutions were not designed for IoT security, it's time for a different approach. In this session, we will present IoT cyber security technologies and will introduce Check Point’s new IoT cyber security solution that is designed to protect the huge number of IoT devices inside any environment and to protect your network from vulnerable devices.

- EST
Keeping the Edge Sharp - Performance Management Simplified
Join Stream
Valeri Loukine
Valeri Loukine
Check Point, Cyber Security Evangelist, Community Lead

In the dynamic world of constantly changing throughput requirements and rapidly evolving cyber security threat, performance is a moving target. In this session, we discuss performance related challenges and ways to resolve them, including the latest innovations such as Dynamic Workflows and Hyperscale solutions.

- EST
Identity Based Access Control and Threat Prevention
Join Stream
Peter Elmer
Peter Elmer
Check Point, Security Expert Europe

Today’s agile working environments require access control and threat prevention performed based on users identity. In addition devices used must be monitored for compliance and corporate guidelines adherence. In this breakout session you will learn how Check Point integrates to on-premises and cloud based directories. You will understand the advantages consuming identity access tokens from SAML providers that bind authentication and authorization to the compliance state of the machine used. Participants will get enabled using solution based documentation to architect solutions for their customers.

- EST
R81: Introducing New Capabilities delivered from the Cloud and SmartConsole Web
Join Stream
Anat Eytan
Anat Eytan
Check Point, Product Manager, Products - R&D
Guy Israeli
Guy Israeli
Check Point, Product Manager, Product Management

Managing security today can be challenging, across our networks, data centers, and multi-cloud environments that are all connected we have more devices, more applications and more threats that leave our organizations vulnerable. The key to reducing the complexity of managing all these moving pieces is security consolidation. R81 is the industry’s most advanced Threat Prevention and security management software that delivers uncompromising simplicity and consolidation across the enterprise. Providing autonomous prevention, R81 aims to relieve the IT admins daily effort and make managing cyber security the simplest it’s ever been. Whether it is deploying the latest technologies and security to protect the organization or expertly crafting security policies, R81 enables enterprises to be their best. Join the session to see how we continue the innovation and take security management to new heights for every business with centralized management control across all networks and cloud environments, increasing operational efficiency and lowering the complexity of managing your security.